Analysis

  • max time kernel
    138s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2023 14:25

General

  • Target

    file.exe

  • Size

    457KB

  • MD5

    288a04f04d9fc3e84ff5b2402c8050b1

  • SHA1

    8e0b920bb33920e298ac9f73ab4b7ea0bbdfdbf2

  • SHA256

    cd15fbc9e839dbc2888b3e72c47827e09a8bc50038a509f138c266ebcf2f3ed6

  • SHA512

    928b111cfb151ad8967e1bde8e1e17ab592f0312f3883b1faf6578401b49cc741dde7ae426ee1ef7d8c985b3e4d4b287ccabaf01ea3841f8438d4dc993d9b5fb

  • SSDEEP

    12288:QkoPbgRuF1R5u7w1eTe5XxLvZNOujzAKv546Q4dPHm:QkEb4E5u7w8Te5XxLhN9l54r4dHm

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

212.224.86.109:1337

Mutex

mTiBFWwWe

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"
      2⤵
        PID:4720
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
        2⤵
          PID:4260
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
          2⤵
            PID:3728
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"
            2⤵
            • Modifies WinLogon for persistence
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:348
            • C:\Windows\explorer.exe
              "C:\Windows\explorer.exe"
              3⤵
              • Modifies Installed Components in the registry
              • Enumerates connected drives
              • Checks SCSI registry key(s)
              • Modifies registry class
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:3276
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 212.224.86.109 1337 mTiBFWwWe
              3⤵
                PID:624
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1428
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4300

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133324359318127454.txt

            Filesize

            75KB

            MD5

            45b9fe0c8a715a7e5d787e28d63dfb31

            SHA1

            a10a98a8553958ab2f71f337a89d97daf69af8f0

            SHA256

            b643029e19de2599a5aa951c6dc6b300684d6c1410ae5639fab0b9683fb0480f

            SHA512

            240e899f9fbb71007c0814ea66c824a383c549a97662688945a63406c54631b86ae5b9c9b6271d2bd1c6909bb8ad04d74fa354250b7b540621fc75712415a03a

          • memory/348-147-0x0000000005490000-0x00000000054A0000-memory.dmp

            Filesize

            64KB

          • memory/348-282-0x0000000005490000-0x00000000054A0000-memory.dmp

            Filesize

            64KB

          • memory/348-135-0x0000000000400000-0x000000000042E000-memory.dmp

            Filesize

            184KB

          • memory/348-137-0x0000000005740000-0x0000000005CE4000-memory.dmp

            Filesize

            5.6MB

          • memory/348-138-0x0000000005270000-0x000000000530C000-memory.dmp

            Filesize

            624KB

          • memory/348-141-0x0000000005540000-0x00000000055D2000-memory.dmp

            Filesize

            584KB

          • memory/348-142-0x0000000005450000-0x000000000545A000-memory.dmp

            Filesize

            40KB

          • memory/624-143-0x0000000005E90000-0x0000000005EF6000-memory.dmp

            Filesize

            408KB

          • memory/624-146-0x0000000006750000-0x00000000067A0000-memory.dmp

            Filesize

            320KB

          • memory/624-149-0x00000000058D0000-0x00000000058E0000-memory.dmp

            Filesize

            64KB

          • memory/624-139-0x0000000000400000-0x0000000000418000-memory.dmp

            Filesize

            96KB

          • memory/624-283-0x00000000058D0000-0x00000000058E0000-memory.dmp

            Filesize

            64KB

          • memory/3276-152-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

            Filesize

            4KB

          • memory/4300-158-0x0000021AA5140000-0x0000021AA5160000-memory.dmp

            Filesize

            128KB

          • memory/4300-162-0x0000021AA5510000-0x0000021AA5530000-memory.dmp

            Filesize

            128KB

          • memory/4300-160-0x0000021AA5100000-0x0000021AA5120000-memory.dmp

            Filesize

            128KB

          • memory/4696-133-0x0000026EFDF20000-0x0000026EFDF96000-memory.dmp

            Filesize

            472KB

          • memory/4696-134-0x0000026EFFDE0000-0x0000026EFFDF0000-memory.dmp

            Filesize

            64KB